Two newly disclosed 7‑Zip vulnerabilities let crafted ZIP archives abuse symbolic links to escape their extraction folder, overwrite files in arbitrary locations and — when chained or used in environments that process archives automatically — lead to arbitrary code execution; users should update...
Delta Electronics’ CNCSoft‑G2 has been the focus of a coordinated disclosure that exposes a file‑parsing out‑of‑bounds write (CWE‑787) in the DPAX project file handler — a flaw tracked as CVE‑2025‑47728 that can lead to arbitrary code execution when a user opens a specially crafted file, and...
Here’s a summary of what happened, based on your Forbes excerpt and forum highlights:
What Happened at Pwn2Own Berlin 2025?
On the first day, Windows 11 was successfully hacked three separate times by elite security researchers using zero-day exploits (vulnerabilities unknown to the vendor)...
The inaugural day of Pwn2Own Berlin 2025, hosted by the Zero Day Initiative (ZDI), showcased a series of groundbreaking exploits across various categories, including the debut of the Artificial Intelligence (AI) category. The event awarded a total of $260,000 to participating researchers, with...
ai vulnerabilities
berlin 2025
bug collisions
cybersecurity
cybersecurity competition
docker
exploit
exploit demonstrations
linux security
os security
pwn2own
research exploits
security research
software security
virtualization
vulnerabilities
vulnerability discovery
windows 11
zerodayinitiativezero-day vulnerabilities
In the ever-evolving landscape of cybersecurity, the discovery of vulnerabilities within trusted software can have far-reaching consequences. A recent investigation by Trend Micro's Zero Day Initiative (ZDI) has brought to light two critical vulnerabilities—ZDI-23-1527 and ZDI-23-1528—in...
Original release date: April 14, 2016
Systems Affected
Microsoft Windows with Apple QuickTime installed
Overview
According to Trend Micro, Apple will no longer be providing security updates for QuickTime for Windows, leaving this software vulnerable to exploitation. [1]
Description
All...
advisories
apple
cybersecurity
data loss
exploitation
integrity
privacy
quicktime
remote access
security
software support
trend micro
uninstall
vulnerabilities
windows
zerodayinitiative